Carbonite 2011 Annual Report Download - page 18

Download and view the complete annual report

Please find page 18 of the 2011 Carbonite annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 186

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186

Table of Contents
We depend on data centers operated by third parties and any disruption in the operation of these facilities could adversely affect our business.
We host our services and serve all of our customers from our network servers, which are located in data center facilities operated by third parties.
While we control and have access to our servers and all of the components of our network that are located in our external data centers, we do not control
the operation of these facilities. Our data center leases expire at various times between August 2013 and January 2016, and a separate data center hosting
arrangement is cancellable by us upon 120 days notice. The owners of our data center facilities have no obligation to renew their agreements with us on
commercially reasonable terms, or at all. If we are unable to renew these agreements on commercially reasonable terms, we may be required to transfer
our servers to new data center facilities, and we may incur significant costs and possible service interruption in connection with doing so. During the
first half of 2012, we intend to relocate our equipment and operations from our Boston, Massachusetts data center to one of our other data centers and to
discontinue the use of our Boston, Massachusetts data center. We will incur moving and other costs in connection with this transition. Any operational
difficulties or disruptions we experience in connection with this transition could adversely affect our reputation and operating results.
Problems faced by our third-party data center locations, with the telecommunications network providers with whom we or they contract, or with
the systems by which our telecommunications providers allocate capacity among their customers, including us, could adversely affect the experience of
our customers. Our third-party data centers operators could decide to close their facilities without adequate notice. In addition, any financial difficulties,
such as bankruptcy, faced by our third-party data centers operators or any of the service providers with whom we or they contract may have negative
effects on our business, the nature and extent of which are difficult to predict. Additionally, if our data centers are unable to keep up with our growing
needs for capacity, this could have an adverse effect on our business. Any changes in third-party service levels at our data centers or any errors, defects,
disruptions, or other performance problems with our services could harm our reputation and may damage our customers’ stored files. Interruptions in
our services might reduce our revenue, cause us to issue refunds to customers, subject us to potential liability, or harm our renewal rates.
If the security of our customers
’ confidential information stored in our systems is breached or their stored files are otherwise subjected to
unauthorized access, our reputation and business may be harmed, and we may be exposed to liability.
Our customers rely on our online system to store digital copies of their files, including financial records, business information, photos, and other
personally meaningful content. We also store credit card information and other personal information about our customers. A breach of our network
security and systems or other events that cause the loss or public disclosure of, or access by third parties to, our customers’ stored files could have
serious negative consequences for our business, including possible fines, penalties and damages, reduced demand for our solutions, an unwillingness of
customers to provide us with their credit card or payment information, an unwillingness of our customers to use our solutions, harm to our reputation
and brand, loss of our ability to accept and process customer credit card orders, and time-consuming and expensive litigation. Third parties may be able
to circumvent our security by deploying viruses, worms, and other malicious software programs that are designed to attack or attempt to infiltrate our
systems and networks and we may not immediately discover these attacks or attempted infiltrations. Further, outside parties may attempt to fraudulently
induce our employees, consultants, or affiliates to disclose sensitive information in order to gain access to our information or our customers’
information. The techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently, often are not
recognized until launched against a target, and may originate from less regulated or remote areas around the world. As a result, we may be unable to
proactively address these techniques or to implement adequate preventative or reactionary measures. In addition, employee or consultant error,
malfeasance, or other errors in the storage, use, or transmission of personal information could result in a breach of customer or employee privacy. We
maintain insurance coverage to mitigate the potential financial impact of these risks; however, our insurance may not cover all such events or may be
insufficient to compensate
15